Book description
The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing critical cyber and physical infrastructures as well as their underlying computing and communication architectures and systems. Examples of such infrastructures include utility networks (e.g., electrical power grids), ground transportation systems (automotives, roads, bridges and tunnels), airports and air traffic control systems, wired and wireless communication and sensor networks, systems for storing and distributing water and food supplies, medical and healthcare delivery systems, as well as financial, banking and commercial transaction assets. The handbook focus mostly on the scientific foundations and engineering techniques – while also addressing the proper integration of policies and access control mechanisms, for example, how human-developed policies can be properly enforced by an automated system.
- Addresses the technical challenges facing design of secure infrastructures by providing examples of problems and solutions from a wide variety of internal and external attack scenarios
- Includes contributions from leading researchers and practitioners in relevant application areas such as smart power grid, intelligent transportation systems, healthcare industry and so on
- Loaded with examples of real world problems and pathways to solutions utilizing specific tools and techniques described in detail throughout
Table of contents
- Cover Image
- Content
- Title
- Copyright
- Dedication
- About the Authors
- Contributors
- Foreword
- Securing Cyber-Physical Infrastructure Perspectives and Overview of the Handbook
- PART I. Theoretical Foundations
-
PART II. Security for Wireless Mobile Networks
- Introduction
- Chapter 5. Mobile Wireless Network Security
- Chapter 6. Robust Wireless Infrastructure against Jamming Attacks
- Chapter 7. Security for Mobile Ad Hoc Networks
-
Chapter 8. Defending Against Identity-Based Attacks in Wireless Networks
- 8.1 Introduction
- 8.2 Feasibility of Launching Identity-Based Attacks
- 8.3 Preventing Identity-Based Attacks via Authentication
- 8.4 Defending Against Spoofing Attacks
- 8.5 Defending Against Sybil Attacks
- 8.6 A Generalized Identity-Based Attack Detection Model
- 8.7 Challenges and Research Directions
- 8.8 Conclusion
- PART III. Security for Sensor Networks
-
PART IV. Platform Security
- Introduction
- Chapter 12. Hardware and Security
-
Chapter 13. Languages and Security
- 13.1 Introduction
- 13.2 Compiler Techniques for Copyrights and Watermarking
- 13.3 Compiler Techniques for Code Obfuscation
- 13.4 Compiler Techniques for Code Integrity
- 13.5 Proof-Carrying Code and Authentication
- 13.6 Static Analysis Techniques and Tools
- 13.7 Information Flow Techniques
- 13.8 Rule checking, Verification, and Run-time Support
- 13.9 Language Modifications for Increased Safety and Security
- 13.10 Conclusions and Future Work
- PART V. Cloud Computing and Data Security
-
PART VI. Event Monitoring and Situation Awareness
- Introduction
- Chapter 18. Distributed Network and System Monitoring for Securing Cyber-Physical Infrastructure
- Chapter 19. Discovering and Tracking Patterns of Interest in Security Sensor Streams
- Chapter 20. Pervasive Sensing and Monitoring for Situational Awareness
- Chapter 21. Sense and Response Systems for Crisis Management
- PART VII. Policy Issues in Security Management
-
PART VIII. Security in Real-World Systems
- Introduction
- Chapter 25. Security and Privacy in the Smart Grid
- Chapter 26. Cyber-Physical Security of Automotive Information Technology
- Chapter 27. Security and Privacy for Mobile Health-Care (m-Health) Systems
-
Chapter 28. Security and Robustness in the Internet Infrastructure
- 28.1 Introduction
- 28.2 Vulnerabilities in Domain Name Resolution
- 28.3 Security Solutions for the Domain Name System
- 28.4 Secure End-to-End Communication Protocols
- 28.5 Integrity of Internet Routing
- 28.6 Integrity Below the IP Layer
- 28.7 Configuration Management Security
- 28.8 Conclusions and Future Challenges
- Acknowledgments
-
Chapter 29. Emergency Vehicular Networks
- 29.1 Introduction
- 29.2 Emergency Vehicle Support
- 29.3 The “Emergency” Vehicle Grid
- 29.4 Basic Urban Grid Routing
- 29.5 Delay-Tolerant Vehicular Routing
- 29.6 Mobimesh and Geo-Location Server: Finding the Destination Coordinates During the Emergency
- 29.7 Content Routing Across the Vanet
- 29.8 Emergency Video Dissemination
- 29.9 Vehicular Grid Surveillance
- 29.10 Map Updates Using Crowdsourcing
- 29.11 Security in the Emergency Vehicular Network
- 29.12 Conclusions
- Chapter 30. Security Issues in VoIP Telecommunication Networks
- Index
Product information
- Title: Handbook on Securing Cyber-Physical Critical Infrastructure
- Author(s):
- Release date: January 2012
- Publisher(s): Morgan Kaufmann
- ISBN: 9780124159105
You might also like
book
Trade Secret Theft, Industrial Espionage, and the China Threat
This book provides an overview of economic espionage as practiced by a range of nations from …
book
Obtaining Value from Big Data for Service Systems, Volume I, 2nd Edition
This volume will assist readers in fitting big data analysis into their service-based organizations. Volume I …
book
Security and Privacy in Cyber-Physical Systems
Written by a team of experts at the forefront of the cyber-physical systems (CPS) revolution, this …
book
VFD Challenges for Shipboard Electrical Power System Design
An in-depth exploration of shipboard power generation and distribution system design that utilizes variable frequency drives …